-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0170
 A number of vulnerabilities have been identified in McAfee Email Gateway
                              4 December 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Email Gateway (MEG) 7.0
                      McAfee Email Gateway (MEG) 7.0.1
                      McAfee Email Gateway (MEG) 7.0.2
Operating System:     Network Appliance
                      VMWare ESX Server
Impact/Access:        Cross-site Scripting -- Remote with User Interaction
                      Denial of Service    -- Existing Account            
Resolution:           Patch/Upgrade
Member content until: Thursday, January  3 2013

OVERVIEW

        A number of vulnerabilities have been identified in McAfee Email 
        Gateway (MEG) prior to version 7.0.2 Hotfix 116. [1]


IMPACT

        The vendor has provided the following details regarding these 
        vulnerabilities:
        
        "Cross-Site Scripting 
        The MEG 7.x Secure Web Delivery Client does not correctly handle email 
        attachment names, allowing specifically named files to execute as 
        scripts. A successful attack could invoke JavaScript when the webmail 
        user subsequently accesses their draft messages.
        
        A malicious email can be constructed that results in an end-user 
        signing into a secure webmail account and running an arbitrary 
        JavaScript fragment when interacting with the message attachments. 
        The interaction can be as simple as hovering over the attachment. 
        Note that the invocation of this attack is limited by the need to 
        highjack an active session cookie.
        
        Denial of Service 
        MEG 7.x does not correctly verify administrative settings for 
        generating email via the Secure Web Mail Client. This allows a user 
        who would normally be unable to compose, forward, or reply to 
        messages the ability to generate messages on the Appliance.
        
        The unauthorized generation of many messages could cause a potential
        Denial of Service (DoS) if the messages consume all available disk 
        space. Note that the severity of this attack is limited by the need
        to highjack an active session cookie." [1]


MITIGATION

        The vendor recommends updating to the latest version of McAfee Email
        Gateway (MEG) to correct these issues. [1]


REFERENCES

        [1] McAfee Security Bulletin - MEG 7.0.2 Hotfix resolves multiple
            issues
            https://kc.mcafee.com/corporate/index?page=content&id=SB10037

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=IRiO
-----END PGP SIGNATURE-----